


default search action
15. CANS 2016: Milan, Italy
- Sara Foresti, Giuseppe Persiano:

Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings. Lecture Notes in Computer Science 10052, 2016, ISBN 978-3-319-48964-3
Cryptanalysis of Symmetric Key
- Si Gao

, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma:
Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. 3-18 - Yosuke Todo

, Masakatu Morii:
Compact Representation for Division Property. 19-35 - Noor R. Al-Kazaz

, Sean A. Irvine, William John Teahan:
An Automatic Cryptanalysis of Transposition Ciphers Using Compression. 36-52
SideChannel Attacks and Implementation
- Serge Vaudenay:

Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra. 55-70 - Merrielle Spain, Mayank Varia:

Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis. 71-87 - Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao

, Mehran Mozaffari Kermani
:
NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM. 88-103
Lattice-Based Cryptography
- Khoa Nguyen

, Huaxiong Wang, Juanyang Zhang:
Server-Aided Revocable Identity-Based Encryption from Lattices. 107-123 - Patrick Longa, Michael Naehrig:

Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography. 124-139 - Rachid El Bansarkhani, Jan Sturm:

An Efficient Lattice-Based Multisignature Scheme with Applications to Bitcoins. 140-155
Virtual Private Network
- Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk:

Breaking PPTP VPNs via RADIUS Encryption. 159-175 - Elijah Sparrow, Harry Halpin, Kali Kaneko, Ruben Pollan:

LEAP: A Next-Generation Client VPN and Encrypted Email Provider. 176-191 - Sergio de los Santos, Carmen Torrano, Yaiza Rubio, Felix Brezo:

Implementation State of HSTS and HPKP in Both Browsers and Servers. 192-207
Signatures and Hash
- David Derler

, Stephan Krenn
, Daniel Slamanig
:
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing. 211-227 - Ai Ishida, Keita Emura

, Goichiro Hanaoka
, Yusuke Sakai
, Keisuke Tanaka:
Group Signature with Deniability: How to Disavow a Signature. 228-244 - Yusuke Naito:

Sandwich Construction for Keyed Sponges: Independence Between Capacity and Online Queries. 245-261
MultiParty Computation
- Kalikinkar Mandal, Basel Alomair

, Radha Poovendran
:
Secure Error-Tolerant Graph Matching Protocols. 265-283 - Aysajan Abidin

, Abdelrahaman Aly, Enrique Argones-Rúa, Aikaterini Mitrokotsa
:
Efficient Verifiable Computation of XOR for Biometric Authentication. 284-298 - Sébastien Canard, Fabien Laguillaumie, Marie Paindavoine:

Verifiable Message-Locked Encryption. 299-315
Symmetric Cryptography and Authentication
- Jian Zhang, Wen-Ling Wu:

Security of Online AE Schemes in RUP Setting. 319-334 - Aysajan Abidin

, Enrique Argones-Rúa, Bart Preneel
:
An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties. 335-349 - Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto:

Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption. 350-364
System Security
- Jean-Claude Royer, Anderson Santana de Oliveira:

AAL and Static Conflict Detection in Policy. 367-382 - Kirill Belyaev, Indrakshi Ray:

Component-Oriented Access Control for Deployment of Application Services in Containerized Environments. 383-399 - Bilel Zaghdoudi, Hella Kaffel-Ben Ayed, Wafa Harizi:

Generic Access Control System for Ad Hoc MCC and Fog Computing. 400-415
Functional and Homomorphic Encryption
- Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang:

SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. 419-434 - Eunkyung Kim, Mehdi Tibouchi

:
FHE Over the Integers and Modular Arithmetic Circuits. 435-450 - Gérald Gavin:

An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization. 451-464
Information Theoretic Security
- Liqun Chen

, Thalia M. Laing, Keith M. Martin:
Efficient, XOR-Based, Ideal (t, n)- threshold Schemes. 467-483 - Takaaki Mizuki

:
Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards. 484-499 - Takeshi Nakai

, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations. 500-517
Malware and Attacks
- Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama:

Evaluation on Malware Classification by Session Sequence of Common Protocols. 521-531 - Faustin Mbol, Jean-Marc Robert, Alireza Sadighian:

An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems. 532-541 - Joash W. J. Tan, Roland H. C. Yap:

Detecting Malware Through Anti-analysis Signals - A Preliminary Study. 542-551 - Radim Ostádal, Petr Svenda, Vashek Matyás:

Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping - Secrecy Amplification Case. 552-561 - Valérie Nachef, Nicolas Marrière, Emmanuel Volte:

Improved Attacks on Extended Generalized Feistel Networks. 562-572 - Thierry Kaufmann, Hervé Pelletier, Serge Vaudenay, Karine Villegas:

When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015. 573-582
MultiParty Computation and Functional Encryption
- Vincenzo Iovino

, Qiang Tang, Karol Zebrowski:
On the Power of Public-key Function-Private Functional Encryption. 585-593 - Sébastien Canard, Duong Hieu Phan

, Viet Cuong Trinh
:
A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption. 594-603 - Satoshi Obana, Maki Yoshida:

An Efficient Construction of Non-Interactive Secure Multiparty Computation. 604-614 - Aysajan Abidin

, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa
:
An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market. 615-625 - Luca Ferretti

, Michele Colajanni
, Mirco Marchetti
:
Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators. 626-636 - Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang:

Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. 637-647
Network Security, Privacy, and Authentication
- Tianxiang Dai

, Haya Schulmann, Michael Waidner
:
DNSSEC Misconfigurations in Popular Domains. 651-660 - Vicenç Torra

, Guillermo Navarro-Arribas
:
Integral Privacy. 661-669 - Yu Pu, Jens Grossklags:

Sharing Is Caring, or Callous? 670-680 - Filipe Beato, Kimmo Halunen, Bart Mennink:

Improving the Sphinx Mix Network. 681-691 - Bashira Akter Anima, Mahmood Jasim, Khandaker Abir Rahman, Adam Rulapaugh, Mohammed Hasanuzzaman:

User Authentication from Mouse Movement Data Using SVM Classifier. 692-700 - Mathilde Igier, Serge Vaudenay:

Distance Bounding Based on PUF. 701-710
Posters
- Tassos Dimitriou, Naser Al-Ibrahim:

Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services. 713-718 - Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo

, Antonino Nocera
:
Range Query Integrity in Cloud Data Streams with Efficient Insertion. 719-724 - Kai Simon:

Vulnerability Analysis Using Google and Shodan. 725-730 - Enrico Budianto, Richard Chow, Jonathan Ding, Michael McCool:

Language-Based Hypervisors. 731-736 - Giuseppe Aceto, Antonio Montieri

, Antonio Pescapè:
Internet Censorship in Italy: A First Look at 3G/4G Networks. 737-742 - Christina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel

:
A Privacy-Preserving Model for Biometric Fusion. 743-748 - Jihoon Cho, Kyu Young Choi

, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg:
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes. 749-754 - Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, Mayank Varia:

Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments. 755-760

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














